Investigating infrastructure that hides behind Cloudflare using OSINTFor those to have to perform investigations, it’s common that, when a website is involved, that it’s behind a Cloudflare infrastructure…Jan 31Jan 31
ROP ChainsSince my main focus is malware analysis, I’m very interested in reverse engineering. I was reading about how to use this topic in binary…Dec 27, 2024Dec 27, 2024
Investigating Phishing with OSINTWhen we are investigating a Phishing attack, it can happen that the malicious link inside of it is currently unavailable. But, fortunatelly…Jun 26, 2024Jun 26, 2024
[Malware Studies] PhenakiteSince my last malware analysis post was about an Android malware, I’ve decided to start to analyze malwares that target iOS devices. This…Jun 15, 2024Jun 15, 2024
(2023) My year in cybersecurity booksIncident Response with Threat Intelligence - Roberto MartinezDec 25, 2023Dec 25, 2023
[Malware Studies] VikingHordeIt’s been a long time but I decided to write another analysis of a binary obtained in theZoo. This time it’s about an Android application.Nov 15, 2023Nov 15, 2023
Using the different kinds of strings in Yara rulesIf you are into cybersecurity and are passionate about ares like Malware Analys or Detection Engineering, you problaby know about Yara…Jul 26, 2023Jul 26, 2023
(2022) My year in cybersecurity booksPractical Social Engineering: A Primer for the Ethical Hacker - Joe GrayJan 11, 2023Jan 11, 2023
[Malware Studies] LockyIn my second text about Malware Studies, this time I’ll show the analysis made in Locky Ransomware. Like the previous post, this executable…Dec 1, 2022Dec 1, 2022
[Malware Studies] CerberI’m been focusing my studies in Reverse Engineering and Malware Analysis. The approach that I’m following is downloading the theZoo’s…Aug 20, 2022Aug 20, 2022